CVE-2021-21978
Published Mar 3, 2021
Last updated a year ago
Overview
- Description
- VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
- Source
- security@vmware.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BC2C971-8105-459B-AA0C-A028882AE46E", "versionEndExcluding": "4.6", "versionStartIncluding": "4.0" }, { "criteria": "cpe:2.3:a:vmware:view_planner:4.6:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3BD451B-DE55-4089-8CAF-0A045C96CD53" } ], "operator": "OR" } ] } ]